{"description":"\u3010\u8981\u70b9\u3011 \u25ce \u7d4c\u7523\u7701\u3068\u30b7\u30f3\u30ac\u30dd\u30fc\u30ebCSA\u306fIoT\u88fd\u54c1\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5236\u5ea6\u306e\u76f8\u4e92\u627f\u8a8d\u3067\u5408\u610f\u3057\u3001JC-STAR\u3068CLS\u306e\u4e00\u90e8\u624b\u7d9a\u304d\u514d\u9664\u3067\u56fd\u969b\u6d41\u901a\u3092\u5f8c\u62bc\u3057\u3059\u308b (Internet Watch)","image_url":null,"provider_url":"https://hatena.blog","published":"2026-03-23 00:00:00","categories":["\u8a8d\u8a3c\u5236\u5ea6: JC-STAR / \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8981\u4ef6\u9069\u5408\u8a55\u4fa1\u53ca\u3073\u30e9\u30d9\u30ea\u30f3\u30b0\u5236\u5ea6","\u56fd: \u30b7\u30f3\u30ac\u30dd\u30fc\u30eb","\u8a8d\u8a3c\u5236\u5ea6: CLS / Cybersecurity Labelling Scheme (\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb)","\u76f8\u4e92\u627f\u8a8d"],"type":"rich","provider_name":"Hatena Blog","author_url":"https://blog.hatena.ne.jp/security-lab/","title":"\u300cJC-STAR\u300d\u3001\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u306eIoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5236\u5ea6\u300cCLS\u300d\u3068\u76f8\u4e92\u627f\u8a8d\u30016\u6708\u304b\u3089\u904b\u7528","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2F2026%2F03%2F23%2F000000_5\" title=\"\u300cJC-STAR\u300d\u3001\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u306eIoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5236\u5ea6\u300cCLS\u300d\u3068\u76f8\u4e92\u627f\u8a8d\u30016\u6708\u304b\u3089\u904b\u7528 - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","version":"1.0","blog_url":"https://security-log.hatenablog.com/","width":"100%","url":"https://security-log.hatenablog.com/entry/2026/03/23/000000_5","blog_title":"TT Security Log","author_name":"security-lab","height":"190"}